MOSE: Using Configuration Management for Evil
Post-exploitation can be one of the most time-consuming but worthwhile tasks that an offensive security professional engages in. Fundamentally, it is where you are able to demonstrate what an adversary may do if they compromise a business. A big compon… Continue reading MOSE: Using Configuration Management for Evil